Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints
Anomaly detection plays a vital role in ensuring the security and reliability of edge clouds, which are decentralized computing environments with limited resources. However, the unique challenges of limited computing power and lack of edge-related labeled training data pose significant obstacles to...
Saved in:
| Main Authors: | Javad Forough, Hamed Haddadi, Monowar Bhuyan, Erik Elmroth |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10745734/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Scheduling strategy for science workflow with deadline constraint on multi-cloud
by: Bing LIN, et al.
Published: (2018-01-01) -
CSP-based resource allocation model and algorithms for energy-efficient cloud computing
by: Wei-wei LIN, et al.
Published: (2013-12-01) -
Sex-Based Constraints in Accessing Agricultural Resources in Ebonyi State, Nigeria
by: Chukwudi Loveday Njoku, et al.
Published: (2025-01-01) -
Gradient formulae for probability functions depending on a heterogenous family of constraints
by: van Ackooij, Wim, et al.
Published: (2021-08-01) -
Phonotactic constraints in cognitive phonology
by: Riitta Välimaa-Blum
Published: (2009-06-01)